Executive Summary

Summary
Title Ruckus Wireless Zoneflex 2942 Wireless Access Point vulnerable to authentication bypass
Informations
Name VU#742932 First vendor Publication 2013-10-10
Vendor VU-CERT Last vendor Modification 2013-10-10
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#742932

Ruckus Wireless Zoneflex 2942 Wireless Access Point vulnerable to authentication bypass

Original Release date: 10 Oct 2013 | Last revised: 10 Oct 2013

Overview

Ruckus Wireless Zoneflex 2942 Wireless Access Point version 9.6.0.0.267 and possibly earlier versions contains an authentication bypass vulnerability (CWE-592).

Description

CWE-592: Authentication Bypass Issues

Ruckus Wireless Zoneflex 2942 Wireless Access Point version 9.6.0.0.267 contains an authentication bypass vulnerability. A local unauthenticated attacker may attempt to login with any credentials and after receiving the authentication failure message, the user can remove the /login.asp portion of the URI to bypass the login page. The attacker will not be able to browse to the other configuration pages of the device via the graphical user interface, but they can then manually edit the URI to gain access to the following pages:
/configuration/wireless.asp
/configuration/local_network.asp
/configuration/internet.asp
/configuration/device.asp
/maintenance/upgrade.asp
/maintenance/reboot.asp

Impact

An unauthenticated attacker may be able to directly access the device's configuration web pages. The attacker may also be able to reboot the access point, resulting in a denial of service.

Solution

We are currently unaware of a practical solution to this problem. Please consider the following workarounds.

Restrict network access

Restrict network access to the Ruckus Wireless Zoneflex 2942 Wireless Access Point web interface and other devices using open protocols like HTTP.

Disable WAN device management

Restrict network access to the Ruckus Wireless Zoneflex 2942 Wireless Access Point web interface from Internet connections.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Ruckus WirelessAffected19 Aug 201303 Oct 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base5.9AV:L/AC:M/Au:N/C:P/I:C/A:P
Temporal4.8E:POC/RL:ND/RC:UC
Environmental1.2CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://cwe.mitre.org/data/definitions/592.html
  • http://www.ruckuswireless.com/products/zoneflex-indoor/2942

Credit

Thanks to MyExploit for reporting this vulnerability.

This document was written by Adam Rauf.

Other Information

  • CVE IDs:CVE-2013-5030
  • Date Public:10 Oct 2013
  • Date First Published:10 Oct 2013
  • Date Last Updated:10 Oct 2013
  • Document Revision:17

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/742932

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1
Os 1

ExploitDB Exploits

id Description
2013-11-19 Ruckus Wireless Zoneflex 2942 Wireless Access Point - Authentication Bypass

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2013-10-16 17:25:40
  • Multiple Updates
2013-10-10 21:21:50
  • First insertion